Skip to main content
Top

2019 | OriginalPaper | Chapter

A Robust Method for Image Copy-Move Passive Forgery Detection with Enhanced Speed

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Forgery detection of images is presently one of the fascinated research fields. Copy-move forgery is the most commonly used methods for image forgery. A novel method is proposed in this paper, which is an effective and advanced method for detecting copy-move forgery. The proposed method is a block matching technique with reduced computational speed and less computational complexities. The efficiency of outcome is also improved. The image is segmented into fixed dimensions of overlying blocks and then discrete cosine transform (DCT) is applied to each block to extract its features. Then, the mean of each block is obtained. The mean of each block is compared with other blocks to find the similarity between the blocks. The computational outcomes are shown that indicates the proposed method is robust to detect copy-move forgery efficiently with enhanced speed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection. In: Visual communications and image processing conference, IEEE Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection. In: Visual communications and image processing conference, IEEE
2.
go back to reference Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRef Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRef
3.
go back to reference Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184 Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184
4.
go back to reference Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Sig Process (World Sci Eng Acad Soc) 5(5):188–197 Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Sig Process (World Sci Eng Acad Soc) 5(5):188–197
5.
go back to reference Bhargava N, Sharma MM, Garhwal AS (2012) An improved image authentication technique using random-sequence based secret-sharing scheme. In: 2012 International conference on radar, communication and computing (ICRCC), 21–22 Dec. 2012. IEEE 07 Feb 2013 Bhargava N, Sharma MM, Garhwal AS (2012) An improved image authentication technique using random-sequence based secret-sharing scheme. In: 2012 International conference on radar, communication and computing (ICRCC), 21–22 Dec. 2012. IEEE 07 Feb 2013
6.
go back to reference Katzenbeisser S, Petitcols FAP (2000) Information techniques for stenography and digital watermarking. Norwood, A, Artec House Katzenbeisser S, Petitcols FAP (2000) Information techniques for stenography and digital watermarking. Norwood, A, Artec House
7.
go back to reference Alam S, Jamil A, Saldhi A (2015) Digital image authentication and encryption using digital signature. In: 2015 international conference on advances in computer engineering and applications (ICACEA), 19–20 Mar 2015. IEEE 23 July 2015 Alam S, Jamil A, Saldhi A (2015) Digital image authentication and encryption using digital signature. In: 2015 international conference on advances in computer engineering and applications (ICACEA), 19–20 Mar 2015. IEEE 23 July 2015
8.
go back to reference Singh VK, Tripathi RC (2011) Fast and efficient region duplication detection in digital images using sub-blocking method. Int J Adv Sci Technol 35:93–102 Singh VK, Tripathi RC (2011) Fast and efficient region duplication detection in digital images using sub-blocking method. Int J Adv Sci Technol 35:93–102
9.
go back to reference Liu G, Wang J, Lian S, Wang Z (2010) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565 Liu G, Wang J, Lian S, Wang Z (2010) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565
10.
go back to reference Sebe N, Liu Y, Zhuang Y, Huang T, Chang S-F (2007) Blind passive media forensics: motivation and opportunity. In: Multimedia content analysis and mining. Springer, Berlin, pp 57–59 Sebe N, Liu Y, Zhuang Y, Huang T, Chang S-F (2007) Blind passive media forensics: motivation and opportunity. In: Multimedia content analysis and mining. Springer, Berlin, pp 57–59
11.
go back to reference Chen C-H, Tang Y-L, Hsieh W-S (2014) Color image authentication and recovery via adaptive encoding. In: 2014 international symposium on computer, consumer and control (IS3C), 10–12 June 2014. IEEE 30 June 2014 Chen C-H, Tang Y-L, Hsieh W-S (2014) Color image authentication and recovery via adaptive encoding. In: 2014 international symposium on computer, consumer and control (IS3C), 10–12 June 2014. IEEE 30 June 2014
12.
go back to reference Zhang Z, Ren Y, Ping XJ, He ZY, Zhang SZ (2008) A survey on passive-blind image forgery by doctor method detection. In: Proceedings of seventh international conference on machine learning and cybernetics, pp 3463–3467 Zhang Z, Ren Y, Ping XJ, He ZY, Zhang SZ (2008) A survey on passive-blind image forgery by doctor method detection. In: Proceedings of seventh international conference on machine learning and cybernetics, pp 3463–3467
13.
go back to reference Kou G, Ma Y (2015) Color image authentication method based on triple-channel spiking cortical model. In: 2015 10th international conference on broadband and wireless computing, communication and applications (BWCCA), 4–6 Nov 201. IEEE 03 Mar 2016 Kou G, Ma Y (2015) Color image authentication method based on triple-channel spiking cortical model. In: 2015 10th international conference on broadband and wireless computing, communication and applications (BWCCA), 4–6 Nov 201. IEEE 03 Mar 2016
14.
go back to reference Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking San Francisco. Morgan Kaufmann, Burlington Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking San Francisco. Morgan Kaufmann, Burlington
Metadata
Title
A Robust Method for Image Copy-Move Passive Forgery Detection with Enhanced Speed
Authors
Asif Hassan
V. K. Sharma
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-00665-5_136